Re: [openpgp] Upgrading PGP Keysize from 4096 to 8000

ericwrightsd619@proton.me Thu, 18 August 2022 21:13 UTC

Return-Path: <ericwrightsd619@proton.me>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1133CC1522D1 for <openpgp@ietfa.amsl.com>; Thu, 18 Aug 2022 14:13:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=proton.me
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FzQlhfPRPXlk for <openpgp@ietfa.amsl.com>; Thu, 18 Aug 2022 14:13:29 -0700 (PDT)
Received: from mail-40141.protonmail.ch (mail-40141.protonmail.ch [185.70.40.141]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B1EFC1524AE for <openpgp@ietf.org>; Thu, 18 Aug 2022 14:13:29 -0700 (PDT)
Date: Thu, 18 Aug 2022 21:13:23 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=protonmail; t=1660857205; x=1661116405; bh=RqPCA9A0R1ZWHJPtyQJq64nL0rNDwoHdKzxxJEmw6Og=; h=Date:To:From:Cc:Reply-To:Subject:Message-ID:In-Reply-To: References:Feedback-ID:From:To:Cc:Date:Subject:Reply-To: Feedback-ID:Message-ID; b=hce2ZGFo811tnkHIL+yu59YqdgmxMS12MikSJ9o1+mVRuprlEjPc+0G2l0LamVpFk FT55VncbpyuGSNJulm/+wes8HWZ8Gf0jKhlCwS5X04WabTZgEo9FMHlfF4XwZa7BA4 kptGlP0CHj/UP/ZkBL0b8TGDFhH0Vr6h9r787InayLNvSfmOnkEVIla7vDjfjPRYuj so3GBYZinFdNkrBb8TlWG5GJl0dl7regMAjTCPdMBeidEtI/ngb9XZHaiukPmP9WeU k72L9Z9yCNEM+r7sMkOB/G0smaj1S4cWwlD6jxXyW5sQCmpWjAaNyQCWjwBChJ4Kip 6kCmRo2HpRRLg==
To: d.huigens@protonmail.com
From: ericwrightsd619@proton.me
Cc: openpgp@ietf.org
Reply-To: ericwrightsd619@proton.me
Message-ID: <puehdnsQqcvr2XcxgVruJr9A8BFYz-kWWtDcr_4qd9RMCOXOSOo6JUnlwR1XxT6lYILSO9UzxWq9_Ti9ZSqOFnAUvBzh5tMvGUtOIm1oWQA=@proton.me>
In-Reply-To: <hoxm-oUxNnPGqT9tWjBJMLEoZVtUgKCXUUiztICF_VLPUAhw5Ku-eKq86hUNVeU4yqq-KCaoiUW5U-6qJ03s8riwH3CO52eQ52DI9v85NHM=@protonmail.com>
References: <uItahvLyOD6ao4d1fJRya5ERg96Qgr8woAwKMu06pyaUaCWRPcaYLzLFjJCORVcfGLSQ9tAYl-m0rWWJlo7K38uQ62H9MYk0QVKYpGl4XGI=@proton.me> <hoxm-oUxNnPGqT9tWjBJMLEoZVtUgKCXUUiztICF_VLPUAhw5Ku-eKq86hUNVeU4yqq-KCaoiUW5U-6qJ03s8riwH3CO52eQ52DI9v85NHM=@protonmail.com>
Feedback-ID: 53067241:user:proton
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="b1_TM7wvUS5Lxj4gLcEI7rh6xN5wNmi5BaY7K64H4Zsrw"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/kDuucArjhjwjYuIgB02leyGs6d0>
Subject: Re: [openpgp] Upgrading PGP Keysize from 4096 to 8000
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Aug 2022 21:13:35 -0000

I agree about ECC keys being preferable encryption options. What open source , GUI based pgp tool do you recommend?

Do you know if ECC is supported by most/all mainline Pgp clients these days?

Sent from Proton Mail mobile

-------- Original Message --------
On Aug 18, 2022, 11:33 AM, Daniel Huigens wrote:

> Hi, There is no limit on RSA key sizes in the OpenPGP specification, although implementations may set limits, of course. However, I do want to note that 8000 bit RSA keys aren't very practical, and ECC keys can offer better security at (much) better performance. Note that the security offered by RSA does not increase linearly with the size of the key. [SP800-57] compares a 7680-bit RSA key to a 192-bit symmetric key, which is less than the security offered by Curve448 or P-521, and the latter two are much more practical. Furthermore, RSA in its current form in OpenPGP (with PKCS#1 v1.5 padding) is deprecated, which is another reason we should switch to ECC keys instead. Best, Daniel [SP800-57]: https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final ------- Original Message ------- On Thursday, August 18th, 2022 at 17:10,  wrote: > Hi, as technology gets faster we must increase our keysizes preemptively to ensure future-security. > > > I am suggesting increasing the PGP MAXIMUM keysize to double the current maximum. A larger key could be twice as secure, and would only take a few seconds longer to encrypt a message. > > please increase the pgp keysizes. > > thanks > > > Sent from Proton Mail mobile >